-
Notifications
You must be signed in to change notification settings - Fork 24.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add warning on unsupported settings to elasticsearch keystore command #31489
Comments
Pinging @elastic/es-security |
Pinging @elastic/es-core-infra |
I would love to have this, but it is technically difficult given the current settings code. When launching the keystore cli, we do not load plugins, yet plugins can have secure settings. In order to validate which settings are allowed (and their type, eg string vs file), we would need to load this information from all plugins. But we do not want to actually load plugins. A long time ago @s1monw was working on a prototype for separating constructing the plugin class (where we could get the setting objects from), and and initialization of the plugin, but I don't know where that was left off. |
@rjernst the reason way this is not separated yet is that REALM settings are not real settings and requires SPI to be loaded in order to get them fully constructed. Once this is resolved we can load settings separately and potentially move the plugin parts out of server to get this stuff on our tools end. (not even sure that is needed). |
Closing this in favor of #46148 which outlines a specific task of needing keystore validation. |
Elasticsearch version : 6.2.1
In the documentation of elasticsearch-keystore, we noted the following:
There is an existing ticket on documenting these settings.
This one covers what happens if the end user ends up adding a setting Elasticsearch does not know of via elasticsearch-keystore. The following is accepted by the command:
will result in Elasticsearch not starting up upon a restart, failing a bootstrap check.
Have we considered adding validation at the time of adding a string via elasticsearch-keystore? Or simply throw a warning back on every invocation of
./elasticsearch-keystore add <setting_name>
to warn users that if they have added an unknown setting, Elasticsearch will fail bootstrap check and not start up?Also, it will be nice to add this check to the list of bootstrap checks in the documentation. Thx!
The text was updated successfully, but these errors were encountered: